Local Post-hoc Explainable Methods for Adversarial Text Attacks Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.36227/techrxiv.17185568.v1
Deep learning models have significantly advanced various natural language processing tasks. However, they are strikingly vulnerable to adversarial text attacks, even in the black-box setting where no model knowledge is accessible to hackers. Such attacks are conducted with a two-phase framework: 1) a sensitivity estimation phase to evaluate each element’s sensitivity to the target model’s prediction, and 2) a perturbation execution phase to craft the adversarial examples based on estimated element sensitivity. This study explored the connections between the local post-hoc explainable methods for deep learning and black-box adversarial text attacks and proposed a novel eXplanation-based method for crafting Adversarial Text Attacks (XATA). XATA leverages local post-hoc explainable methods (e.g., LIME or SHAP) to measure input elements’ sensitivity and adopts the word replacement perturbation strategy to craft adversarial examples. We evaluated the attack performance of the proposed XATA on three commonly used text-based datasets: IMDB Movie Review, Yelp Reviews-Polarity, and Amazon Reviews-Polarity. The proposed XATA outperformed existing baselines in various target models, including LSTM, GRU, CNN, and BERT. Moreover, we found that improved local post-hoc explainable methods (e.g., SHAP) lead to more effective adversarial attacks. These findings showed that when researchers constantly advance the explainability of deep learning models with local post-hoc methods, they also provide hackers with weapons to craft more targeted and dangerous adversarial attacks.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.36227/techrxiv.17185568.v1
- https://www.techrxiv.org/articles/preprint/Local_Post-hoc_Explainable_Methods_for_Adversarial_Text_Attacks/17185568/1/files/31864979.pdf
- OA Status
- gold
- Cited By
- 1
- References
- 62
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4200456679
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4200456679Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.36227/techrxiv.17185568.v1Digital Object Identifier
- Title
-
Local Post-hoc Explainable Methods for Adversarial Text AttacksWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-12-21Full publication date if available
- Authors
-
Yidong Chai, Ruicheng Liang, Hongyi Zhu, Sagar Samtani, Meng Wang, Yezheng Liu, Yuanchun JiangList of authors in order
- Landing page
-
https://doi.org/10.36227/techrxiv.17185568.v1Publisher landing page
- PDF URL
-
https://www.techrxiv.org/articles/preprint/Local_Post-hoc_Explainable_Methods_for_Adversarial_Text_Attacks/17185568/1/files/31864979.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.techrxiv.org/articles/preprint/Local_Post-hoc_Explainable_Methods_for_Adversarial_Text_Attacks/17185568/1/files/31864979.pdfDirect OA link when available
- Concepts
-
Adversarial system, Computer science, Hacker, Post hoc, Craft, Deep learning, Artificial intelligence, Sensitivity (control systems), Black box, Robustness (evolution), Machine learning, Computer security, Engineering, Geography, Chemistry, Archaeology, Gene, Electronic engineering, Dentistry, Medicine, BiochemistryTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1Per-year citation counts (last 5 years)
- References (count)
-
62Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4200456679 |
|---|---|
| doi | https://doi.org/10.36227/techrxiv.17185568.v1 |
| ids.doi | https://doi.org/10.36227/techrxiv.17185568.v1 |
| ids.openalex | https://openalex.org/W4200456679 |
| fwci | 0.0 |
| type | preprint |
| title | Local Post-hoc Explainable Methods for Adversarial Text Attacks |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11689 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9965999722480774 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Adversarial Robustness in Machine Learning |
| topics[1].id | https://openalex.org/T12026 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9940999746322632 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Explainable Artificial Intelligence (XAI) |
| topics[2].id | https://openalex.org/T10028 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9606999754905701 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Topic Modeling |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C37736160 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8648419976234436 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1801315 |
| concepts[0].display_name | Adversarial system |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7850349545478821 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C86844869 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6201762557029724 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q2798820 |
| concepts[2].display_name | Hacker |
| concepts[3].id | https://openalex.org/C2992886853 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6147136688232422 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q18381816 |
| concepts[3].display_name | Post hoc |
| concepts[4].id | https://openalex.org/C2779732396 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5625876784324646 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2207288 |
| concepts[4].display_name | Craft |
| concepts[5].id | https://openalex.org/C108583219 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5371454954147339 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q197536 |
| concepts[5].display_name | Deep learning |
| concepts[6].id | https://openalex.org/C154945302 |
| concepts[6].level | 1 |
| concepts[6].score | 0.5100772976875305 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[6].display_name | Artificial intelligence |
| concepts[7].id | https://openalex.org/C21200559 |
| concepts[7].level | 2 |
| concepts[7].score | 0.49977850914001465 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7451068 |
| concepts[7].display_name | Sensitivity (control systems) |
| concepts[8].id | https://openalex.org/C94966114 |
| concepts[8].level | 2 |
| concepts[8].score | 0.43843579292297363 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q29256 |
| concepts[8].display_name | Black box |
| concepts[9].id | https://openalex.org/C63479239 |
| concepts[9].level | 3 |
| concepts[9].score | 0.414994478225708 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7353546 |
| concepts[9].display_name | Robustness (evolution) |
| concepts[10].id | https://openalex.org/C119857082 |
| concepts[10].level | 1 |
| concepts[10].score | 0.40086159110069275 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[10].display_name | Machine learning |
| concepts[11].id | https://openalex.org/C38652104 |
| concepts[11].level | 1 |
| concepts[11].score | 0.28562232851982117 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[11].display_name | Computer security |
| concepts[12].id | https://openalex.org/C127413603 |
| concepts[12].level | 0 |
| concepts[12].score | 0.10747084021568298 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[12].display_name | Engineering |
| concepts[13].id | https://openalex.org/C205649164 |
| concepts[13].level | 0 |
| concepts[13].score | 0.06845992803573608 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q1071 |
| concepts[13].display_name | Geography |
| concepts[14].id | https://openalex.org/C185592680 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q2329 |
| concepts[14].display_name | Chemistry |
| concepts[15].id | https://openalex.org/C166957645 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q23498 |
| concepts[15].display_name | Archaeology |
| concepts[16].id | https://openalex.org/C104317684 |
| concepts[16].level | 2 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q7187 |
| concepts[16].display_name | Gene |
| concepts[17].id | https://openalex.org/C24326235 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q126095 |
| concepts[17].display_name | Electronic engineering |
| concepts[18].id | https://openalex.org/C199343813 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q12128 |
| concepts[18].display_name | Dentistry |
| concepts[19].id | https://openalex.org/C71924100 |
| concepts[19].level | 0 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[19].display_name | Medicine |
| concepts[20].id | https://openalex.org/C55493867 |
| concepts[20].level | 1 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q7094 |
| concepts[20].display_name | Biochemistry |
| keywords[0].id | https://openalex.org/keywords/adversarial-system |
| keywords[0].score | 0.8648419976234436 |
| keywords[0].display_name | Adversarial system |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7850349545478821 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/hacker |
| keywords[2].score | 0.6201762557029724 |
| keywords[2].display_name | Hacker |
| keywords[3].id | https://openalex.org/keywords/post-hoc |
| keywords[3].score | 0.6147136688232422 |
| keywords[3].display_name | Post hoc |
| keywords[4].id | https://openalex.org/keywords/craft |
| keywords[4].score | 0.5625876784324646 |
| keywords[4].display_name | Craft |
| keywords[5].id | https://openalex.org/keywords/deep-learning |
| keywords[5].score | 0.5371454954147339 |
| keywords[5].display_name | Deep learning |
| keywords[6].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[6].score | 0.5100772976875305 |
| keywords[6].display_name | Artificial intelligence |
| keywords[7].id | https://openalex.org/keywords/sensitivity |
| keywords[7].score | 0.49977850914001465 |
| keywords[7].display_name | Sensitivity (control systems) |
| keywords[8].id | https://openalex.org/keywords/black-box |
| keywords[8].score | 0.43843579292297363 |
| keywords[8].display_name | Black box |
| keywords[9].id | https://openalex.org/keywords/robustness |
| keywords[9].score | 0.414994478225708 |
| keywords[9].display_name | Robustness (evolution) |
| keywords[10].id | https://openalex.org/keywords/machine-learning |
| keywords[10].score | 0.40086159110069275 |
| keywords[10].display_name | Machine learning |
| keywords[11].id | https://openalex.org/keywords/computer-security |
| keywords[11].score | 0.28562232851982117 |
| keywords[11].display_name | Computer security |
| keywords[12].id | https://openalex.org/keywords/engineering |
| keywords[12].score | 0.10747084021568298 |
| keywords[12].display_name | Engineering |
| keywords[13].id | https://openalex.org/keywords/geography |
| keywords[13].score | 0.06845992803573608 |
| keywords[13].display_name | Geography |
| language | en |
| locations[0].id | doi:10.36227/techrxiv.17185568.v1 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.techrxiv.org/articles/preprint/Local_Post-hoc_Explainable_Methods_for_Adversarial_Text_Attacks/17185568/1/files/31864979.pdf |
| locations[0].version | acceptedVersion |
| locations[0].raw_type | posted-content |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.36227/techrxiv.17185568.v1 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5030014366 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-0260-7589 |
| authorships[0].author.display_name | Yidong Chai |
| authorships[0].countries | CN, US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I592451 |
| authorships[0].affiliations[0].raw_affiliation_string | School of Business, Indiana University. |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I16365422 |
| authorships[0].affiliations[1].raw_affiliation_string | the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[0].affiliations[2].institution_ids | https://openalex.org/I45438204 |
| authorships[0].affiliations[2].raw_affiliation_string | College of Business, University of Texas at San Antonio. |
| authorships[0].affiliations[3].institution_ids | https://openalex.org/I16365422 |
| authorships[0].affiliations[3].raw_affiliation_string | School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China. |
| authorships[0].institutions[0].id | https://openalex.org/I16365422 |
| authorships[0].institutions[0].ror | https://ror.org/02czkny70 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I16365422 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Hefei University of Technology |
| authorships[0].institutions[1].id | https://openalex.org/I592451 |
| authorships[0].institutions[1].ror | https://ror.org/01kg8sb98 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I592451 |
| authorships[0].institutions[1].country_code | US |
| authorships[0].institutions[1].display_name | Indiana University |
| authorships[0].institutions[2].id | https://openalex.org/I45438204 |
| authorships[0].institutions[2].ror | https://ror.org/01kd65564 |
| authorships[0].institutions[2].type | education |
| authorships[0].institutions[2].lineage | https://openalex.org/I45438204 |
| authorships[0].institutions[2].country_code | US |
| authorships[0].institutions[2].display_name | The University of Texas at San Antonio |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Yidong Chai |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | College of Business, University of Texas at San Antonio., School of Business, Indiana University., School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China., the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[1].author.id | https://openalex.org/A5025447683 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-6266-2657 |
| authorships[1].author.display_name | Ruicheng Liang |
| authorships[1].countries | CN, US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I16365422 |
| authorships[1].affiliations[0].raw_affiliation_string | the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[1].affiliations[1].institution_ids | https://openalex.org/I45438204 |
| authorships[1].affiliations[1].raw_affiliation_string | College of Business, University of Texas at San Antonio. |
| authorships[1].affiliations[2].institution_ids | https://openalex.org/I16365422 |
| authorships[1].affiliations[2].raw_affiliation_string | School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China. |
| authorships[1].affiliations[3].institution_ids | https://openalex.org/I592451 |
| authorships[1].affiliations[3].raw_affiliation_string | School of Business, Indiana University. |
| authorships[1].institutions[0].id | https://openalex.org/I16365422 |
| authorships[1].institutions[0].ror | https://ror.org/02czkny70 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I16365422 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Hefei University of Technology |
| authorships[1].institutions[1].id | https://openalex.org/I592451 |
| authorships[1].institutions[1].ror | https://ror.org/01kg8sb98 |
| authorships[1].institutions[1].type | education |
| authorships[1].institutions[1].lineage | https://openalex.org/I592451 |
| authorships[1].institutions[1].country_code | US |
| authorships[1].institutions[1].display_name | Indiana University |
| authorships[1].institutions[2].id | https://openalex.org/I45438204 |
| authorships[1].institutions[2].ror | https://ror.org/01kd65564 |
| authorships[1].institutions[2].type | education |
| authorships[1].institutions[2].lineage | https://openalex.org/I45438204 |
| authorships[1].institutions[2].country_code | US |
| authorships[1].institutions[2].display_name | The University of Texas at San Antonio |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Ruicheng Liang |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | College of Business, University of Texas at San Antonio., School of Business, Indiana University., School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China., the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[2].author.id | https://openalex.org/A5075073019 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-2633-7686 |
| authorships[2].author.display_name | Hongyi Zhu |
| authorships[2].countries | CN, US |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I16365422 |
| authorships[2].affiliations[0].raw_affiliation_string | the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[2].affiliations[1].institution_ids | https://openalex.org/I592451 |
| authorships[2].affiliations[1].raw_affiliation_string | School of Business, Indiana University. |
| authorships[2].affiliations[2].institution_ids | https://openalex.org/I45438204 |
| authorships[2].affiliations[2].raw_affiliation_string | College of Business, University of Texas at San Antonio. |
| authorships[2].affiliations[3].institution_ids | https://openalex.org/I16365422 |
| authorships[2].affiliations[3].raw_affiliation_string | School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China. |
| authorships[2].institutions[0].id | https://openalex.org/I16365422 |
| authorships[2].institutions[0].ror | https://ror.org/02czkny70 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I16365422 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Hefei University of Technology |
| authorships[2].institutions[1].id | https://openalex.org/I592451 |
| authorships[2].institutions[1].ror | https://ror.org/01kg8sb98 |
| authorships[2].institutions[1].type | education |
| authorships[2].institutions[1].lineage | https://openalex.org/I592451 |
| authorships[2].institutions[1].country_code | US |
| authorships[2].institutions[1].display_name | Indiana University |
| authorships[2].institutions[2].id | https://openalex.org/I45438204 |
| authorships[2].institutions[2].ror | https://ror.org/01kd65564 |
| authorships[2].institutions[2].type | education |
| authorships[2].institutions[2].lineage | https://openalex.org/I45438204 |
| authorships[2].institutions[2].country_code | US |
| authorships[2].institutions[2].display_name | The University of Texas at San Antonio |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Hongyi Zhu |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | College of Business, University of Texas at San Antonio., School of Business, Indiana University., School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China., the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[3].author.id | https://openalex.org/A5038811607 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-4513-805X |
| authorships[3].author.display_name | Sagar Samtani |
| authorships[3].countries | CN, US |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I16365422 |
| authorships[3].affiliations[0].raw_affiliation_string | the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[3].affiliations[1].institution_ids | https://openalex.org/I592451 |
| authorships[3].affiliations[1].raw_affiliation_string | School of Business, Indiana University. |
| authorships[3].affiliations[2].institution_ids | https://openalex.org/I45438204 |
| authorships[3].affiliations[2].raw_affiliation_string | College of Business, University of Texas at San Antonio. |
| authorships[3].affiliations[3].institution_ids | https://openalex.org/I16365422 |
| authorships[3].affiliations[3].raw_affiliation_string | School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China. |
| authorships[3].institutions[0].id | https://openalex.org/I16365422 |
| authorships[3].institutions[0].ror | https://ror.org/02czkny70 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I16365422 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Hefei University of Technology |
| authorships[3].institutions[1].id | https://openalex.org/I592451 |
| authorships[3].institutions[1].ror | https://ror.org/01kg8sb98 |
| authorships[3].institutions[1].type | education |
| authorships[3].institutions[1].lineage | https://openalex.org/I592451 |
| authorships[3].institutions[1].country_code | US |
| authorships[3].institutions[1].display_name | Indiana University |
| authorships[3].institutions[2].id | https://openalex.org/I45438204 |
| authorships[3].institutions[2].ror | https://ror.org/01kd65564 |
| authorships[3].institutions[2].type | education |
| authorships[3].institutions[2].lineage | https://openalex.org/I45438204 |
| authorships[3].institutions[2].country_code | US |
| authorships[3].institutions[2].display_name | The University of Texas at San Antonio |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Sagar Samtani |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | College of Business, University of Texas at San Antonio., School of Business, Indiana University., School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China., the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[4].author.id | https://openalex.org/A5100377147 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-3094-7735 |
| authorships[4].author.display_name | Meng Wang |
| authorships[4].countries | CN, US |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I16365422 |
| authorships[4].affiliations[0].raw_affiliation_string | the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[4].affiliations[1].institution_ids | https://openalex.org/I592451 |
| authorships[4].affiliations[1].raw_affiliation_string | School of Business, Indiana University. |
| authorships[4].affiliations[2].institution_ids | https://openalex.org/I45438204 |
| authorships[4].affiliations[2].raw_affiliation_string | College of Business, University of Texas at San Antonio. |
| authorships[4].affiliations[3].institution_ids | https://openalex.org/I16365422 |
| authorships[4].affiliations[3].raw_affiliation_string | School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China. |
| authorships[4].institutions[0].id | https://openalex.org/I16365422 |
| authorships[4].institutions[0].ror | https://ror.org/02czkny70 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I16365422 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Hefei University of Technology |
| authorships[4].institutions[1].id | https://openalex.org/I592451 |
| authorships[4].institutions[1].ror | https://ror.org/01kg8sb98 |
| authorships[4].institutions[1].type | education |
| authorships[4].institutions[1].lineage | https://openalex.org/I592451 |
| authorships[4].institutions[1].country_code | US |
| authorships[4].institutions[1].display_name | Indiana University |
| authorships[4].institutions[2].id | https://openalex.org/I45438204 |
| authorships[4].institutions[2].ror | https://ror.org/01kd65564 |
| authorships[4].institutions[2].type | education |
| authorships[4].institutions[2].lineage | https://openalex.org/I45438204 |
| authorships[4].institutions[2].country_code | US |
| authorships[4].institutions[2].display_name | The University of Texas at San Antonio |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Meng Wang |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | College of Business, University of Texas at San Antonio., School of Business, Indiana University., School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China., the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[5].author.id | https://openalex.org/A5030946475 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-9193-5236 |
| authorships[5].author.display_name | Yezheng Liu |
| authorships[5].countries | CN, US |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I45438204 |
| authorships[5].affiliations[0].raw_affiliation_string | College of Business, University of Texas at San Antonio. |
| authorships[5].affiliations[1].institution_ids | https://openalex.org/I16365422 |
| authorships[5].affiliations[1].raw_affiliation_string | School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China. |
| authorships[5].affiliations[2].institution_ids | https://openalex.org/I16365422 |
| authorships[5].affiliations[2].raw_affiliation_string | the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[5].affiliations[3].institution_ids | https://openalex.org/I592451 |
| authorships[5].affiliations[3].raw_affiliation_string | School of Business, Indiana University. |
| authorships[5].institutions[0].id | https://openalex.org/I16365422 |
| authorships[5].institutions[0].ror | https://ror.org/02czkny70 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I16365422 |
| authorships[5].institutions[0].country_code | CN |
| authorships[5].institutions[0].display_name | Hefei University of Technology |
| authorships[5].institutions[1].id | https://openalex.org/I592451 |
| authorships[5].institutions[1].ror | https://ror.org/01kg8sb98 |
| authorships[5].institutions[1].type | education |
| authorships[5].institutions[1].lineage | https://openalex.org/I592451 |
| authorships[5].institutions[1].country_code | US |
| authorships[5].institutions[1].display_name | Indiana University |
| authorships[5].institutions[2].id | https://openalex.org/I45438204 |
| authorships[5].institutions[2].ror | https://ror.org/01kd65564 |
| authorships[5].institutions[2].type | education |
| authorships[5].institutions[2].lineage | https://openalex.org/I45438204 |
| authorships[5].institutions[2].country_code | US |
| authorships[5].institutions[2].display_name | The University of Texas at San Antonio |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Yezheng Liu |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | College of Business, University of Texas at San Antonio., School of Business, Indiana University., School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China., the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[6].author.id | https://openalex.org/A5004103125 |
| authorships[6].author.orcid | https://orcid.org/0000-0003-0886-3647 |
| authorships[6].author.display_name | Yuanchun Jiang |
| authorships[6].countries | CN, US |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I45438204 |
| authorships[6].affiliations[0].raw_affiliation_string | College of Business, University of Texas at San Antonio. |
| authorships[6].affiliations[1].institution_ids | https://openalex.org/I16365422 |
| authorships[6].affiliations[1].raw_affiliation_string | School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China. |
| authorships[6].affiliations[2].institution_ids | https://openalex.org/I592451 |
| authorships[6].affiliations[2].raw_affiliation_string | School of Business, Indiana University. |
| authorships[6].affiliations[3].institution_ids | https://openalex.org/I16365422 |
| authorships[6].affiliations[3].raw_affiliation_string | the School of Management of Hefei University of Technology. Hefei, China. |
| authorships[6].institutions[0].id | https://openalex.org/I16365422 |
| authorships[6].institutions[0].ror | https://ror.org/02czkny70 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I16365422 |
| authorships[6].institutions[0].country_code | CN |
| authorships[6].institutions[0].display_name | Hefei University of Technology |
| authorships[6].institutions[1].id | https://openalex.org/I592451 |
| authorships[6].institutions[1].ror | https://ror.org/01kg8sb98 |
| authorships[6].institutions[1].type | education |
| authorships[6].institutions[1].lineage | https://openalex.org/I592451 |
| authorships[6].institutions[1].country_code | US |
| authorships[6].institutions[1].display_name | Indiana University |
| authorships[6].institutions[2].id | https://openalex.org/I45438204 |
| authorships[6].institutions[2].ror | https://ror.org/01kd65564 |
| authorships[6].institutions[2].type | education |
| authorships[6].institutions[2].lineage | https://openalex.org/I45438204 |
| authorships[6].institutions[2].country_code | US |
| authorships[6].institutions[2].display_name | The University of Texas at San Antonio |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Yuanchun Jiang |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | College of Business, University of Texas at San Antonio., School of Business, Indiana University., School of Computer Science and Information Engi-neering, Hefei University of Technology. Hefei China., the School of Management of Hefei University of Technology. Hefei, China. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.techrxiv.org/articles/preprint/Local_Post-hoc_Explainable_Methods_for_Adversarial_Text_Attacks/17185568/1/files/31864979.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Local Post-hoc Explainable Methods for Adversarial Text Attacks |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11689 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9965999722480774 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Adversarial Robustness in Machine Learning |
| related_works | https://openalex.org/W2920882006, https://openalex.org/W2771752657, https://openalex.org/W1567987063, https://openalex.org/W2391860589, https://openalex.org/W2030429945, https://openalex.org/W114878902, https://openalex.org/W4379538695, https://openalex.org/W3009622996, https://openalex.org/W4377115400, https://openalex.org/W4382240676 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.36227/techrxiv.17185568.v1 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.techrxiv.org/articles/preprint/Local_Post-hoc_Explainable_Methods_for_Adversarial_Text_Attacks/17185568/1/files/31864979.pdf |
| best_oa_location.version | acceptedVersion |
| best_oa_location.raw_type | posted-content |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.36227/techrxiv.17185568.v1 |
| primary_location.id | doi:10.36227/techrxiv.17185568.v1 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.techrxiv.org/articles/preprint/Local_Post-hoc_Explainable_Methods_for_Adversarial_Text_Attacks/17185568/1/files/31864979.pdf |
| primary_location.version | acceptedVersion |
| primary_location.raw_type | posted-content |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.36227/techrxiv.17185568.v1 |
| publication_date | 2021-12-21 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2981220581, https://openalex.org/W3192856967, https://openalex.org/W2912231389, https://openalex.org/W1945616565, https://openalex.org/W2783097478, https://openalex.org/W6737220129, https://openalex.org/W2963859254, https://openalex.org/W3203135439, https://openalex.org/W6799881784, https://openalex.org/W3035821888, https://openalex.org/W2930926105, https://openalex.org/W2603766943, https://openalex.org/W2971970905, https://openalex.org/W2949128310, https://openalex.org/W2605409611, https://openalex.org/W2958089299, https://openalex.org/W6695661434, https://openalex.org/W2618851150, https://openalex.org/W6727581327, https://openalex.org/W2769421449, https://openalex.org/W1924770834, https://openalex.org/W2896457183, https://openalex.org/W3099803414, https://openalex.org/W3094292485, https://openalex.org/W2917779306, https://openalex.org/W3014153848, https://openalex.org/W6745847742, https://openalex.org/W3015001695, https://openalex.org/W2344365922, https://openalex.org/W6910556514, https://openalex.org/W2799194071, https://openalex.org/W2408141691, https://openalex.org/W6807892083, https://openalex.org/W2551974706, https://openalex.org/W6771876530, https://openalex.org/W3200913691, https://openalex.org/W2923325523, https://openalex.org/W3117433489, https://openalex.org/W3018458867, https://openalex.org/W1522301498, https://openalex.org/W2811010710, https://openalex.org/W2962907114, https://openalex.org/W3104423855, https://openalex.org/W3101449015, https://openalex.org/W3174150157, https://openalex.org/W2964060211, https://openalex.org/W3015177564, https://openalex.org/W2609368435, https://openalex.org/W3021395787, https://openalex.org/W2994506732, https://openalex.org/W4287639392, https://openalex.org/W2806246579, https://openalex.org/W2516809705, https://openalex.org/W2996851481, https://openalex.org/W2788403449, https://openalex.org/W2996061341, https://openalex.org/W3216683580, https://openalex.org/W2963834268, https://openalex.org/W2962818281, https://openalex.org/W3105640742, https://openalex.org/W4288104702, https://openalex.org/W2962862931 |
| referenced_works_count | 62 |
| abstract_inverted_index.a | 38, 42, 58, 93 |
| abstract_inverted_index.1) | 41 |
| abstract_inverted_index.2) | 57 |
| abstract_inverted_index.We | 129 |
| abstract_inverted_index.in | 21, 158 |
| abstract_inverted_index.is | 29 |
| abstract_inverted_index.no | 26 |
| abstract_inverted_index.of | 134, 195 |
| abstract_inverted_index.on | 68, 138 |
| abstract_inverted_index.or | 111 |
| abstract_inverted_index.to | 16, 31, 46, 51, 62, 113, 125, 180, 209 |
| abstract_inverted_index.we | 169 |
| abstract_inverted_index.The | 152 |
| abstract_inverted_index.and | 56, 86, 91, 118, 149, 166, 213 |
| abstract_inverted_index.are | 13, 35 |
| abstract_inverted_index.for | 83, 97 |
| abstract_inverted_index.the | 22, 52, 64, 75, 78, 120, 131, 135, 193 |
| abstract_inverted_index.CNN, | 165 |
| abstract_inverted_index.Deep | 0 |
| abstract_inverted_index.GRU, | 164 |
| abstract_inverted_index.IMDB | 144 |
| abstract_inverted_index.LIME | 110 |
| abstract_inverted_index.Such | 33 |
| abstract_inverted_index.Text | 100 |
| abstract_inverted_index.This | 72 |
| abstract_inverted_index.XATA | 103, 137, 154 |
| abstract_inverted_index.Yelp | 147 |
| abstract_inverted_index.also | 204 |
| abstract_inverted_index.deep | 84, 196 |
| abstract_inverted_index.each | 48 |
| abstract_inverted_index.even | 20 |
| abstract_inverted_index.have | 3 |
| abstract_inverted_index.lead | 179 |
| abstract_inverted_index.more | 181, 211 |
| abstract_inverted_index.text | 18, 89 |
| abstract_inverted_index.that | 171, 188 |
| abstract_inverted_index.they | 12, 203 |
| abstract_inverted_index.used | 141 |
| abstract_inverted_index.when | 189 |
| abstract_inverted_index.with | 37, 199, 207 |
| abstract_inverted_index.word | 121 |
| abstract_inverted_index.BERT. | 167 |
| abstract_inverted_index.LSTM, | 163 |
| abstract_inverted_index.Movie | 145 |
| abstract_inverted_index.SHAP) | 112, 178 |
| abstract_inverted_index.These | 185 |
| abstract_inverted_index.based | 67 |
| abstract_inverted_index.craft | 63, 126, 210 |
| abstract_inverted_index.found | 170 |
| abstract_inverted_index.input | 115 |
| abstract_inverted_index.local | 79, 105, 173, 200 |
| abstract_inverted_index.model | 27 |
| abstract_inverted_index.novel | 94 |
| abstract_inverted_index.phase | 45, 61 |
| abstract_inverted_index.study | 73 |
| abstract_inverted_index.three | 139 |
| abstract_inverted_index.where | 25 |
| abstract_inverted_index.(e.g., | 109, 177 |
| abstract_inverted_index.Amazon | 150 |
| abstract_inverted_index.adopts | 119 |
| abstract_inverted_index.attack | 132 |
| abstract_inverted_index.method | 96 |
| abstract_inverted_index.models | 2, 198 |
| abstract_inverted_index.showed | 187 |
| abstract_inverted_index.target | 53, 160 |
| abstract_inverted_index.tasks. | 10 |
| abstract_inverted_index.(XATA). | 102 |
| abstract_inverted_index.Attacks | 101 |
| abstract_inverted_index.Review, | 146 |
| abstract_inverted_index.advance | 192 |
| abstract_inverted_index.attacks | 34, 90 |
| abstract_inverted_index.between | 77 |
| abstract_inverted_index.element | 70 |
| abstract_inverted_index.hackers | 206 |
| abstract_inverted_index.measure | 114 |
| abstract_inverted_index.methods | 82, 108, 176 |
| abstract_inverted_index.models, | 161 |
| abstract_inverted_index.natural | 7 |
| abstract_inverted_index.provide | 205 |
| abstract_inverted_index.setting | 24 |
| abstract_inverted_index.various | 6, 159 |
| abstract_inverted_index.weapons | 208 |
| abstract_inverted_index.However, | 11 |
| abstract_inverted_index.advanced | 5 |
| abstract_inverted_index.attacks, | 19 |
| abstract_inverted_index.attacks. | 184, 216 |
| abstract_inverted_index.commonly | 140 |
| abstract_inverted_index.crafting | 98 |
| abstract_inverted_index.evaluate | 47 |
| abstract_inverted_index.examples | 66 |
| abstract_inverted_index.existing | 156 |
| abstract_inverted_index.explored | 74 |
| abstract_inverted_index.findings | 186 |
| abstract_inverted_index.hackers. | 32 |
| abstract_inverted_index.improved | 172 |
| abstract_inverted_index.language | 8 |
| abstract_inverted_index.learning | 1, 85, 197 |
| abstract_inverted_index.methods, | 202 |
| abstract_inverted_index.post-hoc | 80, 106, 174, 201 |
| abstract_inverted_index.proposed | 92, 136, 153 |
| abstract_inverted_index.strategy | 124 |
| abstract_inverted_index.targeted | 212 |
| abstract_inverted_index.Moreover, | 168 |
| abstract_inverted_index.baselines | 157 |
| abstract_inverted_index.black-box | 23, 87 |
| abstract_inverted_index.conducted | 36 |
| abstract_inverted_index.dangerous | 214 |
| abstract_inverted_index.datasets: | 143 |
| abstract_inverted_index.effective | 182 |
| abstract_inverted_index.estimated | 69 |
| abstract_inverted_index.evaluated | 130 |
| abstract_inverted_index.examples. | 128 |
| abstract_inverted_index.execution | 60 |
| abstract_inverted_index.including | 162 |
| abstract_inverted_index.knowledge | 28 |
| abstract_inverted_index.leverages | 104 |
| abstract_inverted_index.model’s | 54 |
| abstract_inverted_index.two-phase | 39 |
| abstract_inverted_index.accessible | 30 |
| abstract_inverted_index.constantly | 191 |
| abstract_inverted_index.estimation | 44 |
| abstract_inverted_index.framework: | 40 |
| abstract_inverted_index.processing | 9 |
| abstract_inverted_index.strikingly | 14 |
| abstract_inverted_index.text-based | 142 |
| abstract_inverted_index.vulnerable | 15 |
| abstract_inverted_index.Adversarial | 99 |
| abstract_inverted_index.adversarial | 17, 65, 88, 127, 183, 215 |
| abstract_inverted_index.connections | 76 |
| abstract_inverted_index.elements’ | 116 |
| abstract_inverted_index.element’s | 49 |
| abstract_inverted_index.explainable | 81, 107, 175 |
| abstract_inverted_index.performance | 133 |
| abstract_inverted_index.prediction, | 55 |
| abstract_inverted_index.replacement | 122 |
| abstract_inverted_index.researchers | 190 |
| abstract_inverted_index.sensitivity | 43, 50, 117 |
| abstract_inverted_index.outperformed | 155 |
| abstract_inverted_index.perturbation | 59, 123 |
| abstract_inverted_index.sensitivity. | 71 |
| abstract_inverted_index.significantly | 4 |
| abstract_inverted_index.explainability | 194 |
| abstract_inverted_index.Reviews-Polarity, | 148 |
| abstract_inverted_index.Reviews-Polarity. | 151 |
| abstract_inverted_index.eXplanation-based | 95 |
| cited_by_percentile_year.max | 95 |
| cited_by_percentile_year.min | 91 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 7 |
| citation_normalized_percentile.value | 0.19076961 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |